Download presentation
Presentation is loading. Please wait.
Published byShea Twyford Modified over 10 years ago
1
Start Finish #1
2
Which of the following school employees are the only ones who are authorized for changing computer settings and configurations? Myself and/or my student helper Grade/department chair or team leaders District Computer Technicians Librarian or Library Aide Myself and/or my student helper Grade/department chair or team leaders District Computer Technicians Librarian or Library Aide
4
Start Finish #1 #2
5
In Vidor ISD I am given access to VISDs network and Internet via a computer and am responsible for: Proper conduct while using the computer to send and receive e-mail and searching the InternetProper conduct while using the computer to send and receive e-mail and searching the Internet Adhering to district guidelines Being aware of ethical and legal responsibilitiesBeing aware of ethical and legal responsibilities All of the above Proper conduct while using the computer to send and receive e-mail and searching the InternetProper conduct while using the computer to send and receive e-mail and searching the Internet Adhering to district guidelines Being aware of ethical and legal responsibilitiesBeing aware of ethical and legal responsibilities All of the above
7
Start Finish #1 #2 #3
8
Which disciplinary actions can be taken for violation of districts AUP for electronic communications? Loss of network privileges Written reprimand Suspension or termination of employmentSuspension or termination of employment All of the above Loss of network privileges Written reprimand Suspension or termination of employmentSuspension or termination of employment All of the above
10
Start Finish #1 #2 #3 #4
11
Which of the following types of software may be installed on my computer? Programs licensed and purchased by the school or districtPrograms licensed and purchased by the school or district Programs copied from family or colleaguesPrograms copied from family or colleagues Programs that are non-educational games or contain inappropriate graphicsPrograms that are non-educational games or contain inappropriate graphics Free programs received through the mail Programs licensed and purchased by the school or districtPrograms licensed and purchased by the school or district Programs copied from family or colleaguesPrograms copied from family or colleagues Programs that are non-educational games or contain inappropriate graphicsPrograms that are non-educational games or contain inappropriate graphics Free programs received through the mail
13
Start Finish #1 #2 #3 #4 #5
14
As a system user, I am responsible for: Learning my password(s) and sharing them only with those I feel are responsibleLearning my password(s) and sharing them only with those I feel are responsible Learning my password(s) and keeping them strictly confidentialLearning my password(s) and keeping them strictly confidential Learning my password(s) and allowing only the good and trusted students to have themLearning my password(s) and allowing only the good and trusted students to have them Learning my password(s) and only letting my grade/team leader have themLearning my password(s) and only letting my grade/team leader have them Learning my password(s) and sharing them only with those I feel are responsibleLearning my password(s) and sharing them only with those I feel are responsible Learning my password(s) and keeping them strictly confidentialLearning my password(s) and keeping them strictly confidential Learning my password(s) and allowing only the good and trusted students to have themLearning my password(s) and allowing only the good and trusted students to have them Learning my password(s) and only letting my grade/team leader have themLearning my password(s) and only letting my grade/team leader have them
16
Start Finish #1 #2 #3 #4 #5 #6
17
While using my e-mail account I understand that: My electronic communications are private and cannot be accessed by anyone elseMy electronic communications are private and cannot be accessed by anyone else My electronic communications may be reviewed and read by district network administratorsMy electronic communications may be reviewed and read by district network administrators My electronic communications cannot be reviewed or read without my permissionMy electronic communications cannot be reviewed or read without my permission My electronic communications are private and cannot be accessed by anyone elseMy electronic communications are private and cannot be accessed by anyone else My electronic communications may be reviewed and read by district network administratorsMy electronic communications may be reviewed and read by district network administrators My electronic communications cannot be reviewed or read without my permissionMy electronic communications cannot be reviewed or read without my permission
19
Start Finish #1 #2 #3 #4 #5 #6 #7
20
Which of the following types of software may an employee install on a district computer? Freeware or shareware downloaded from the InternetFreeware or shareware downloaded from the Internet Commercial or educational software purchased from a vendor or storeCommercial or educational software purchased from a vendor or store Utilities program such as virus programs or disk doctorsUtilities program such as virus programs or disk doctors None of the above Freeware or shareware downloaded from the InternetFreeware or shareware downloaded from the Internet Commercial or educational software purchased from a vendor or storeCommercial or educational software purchased from a vendor or store Utilities program such as virus programs or disk doctorsUtilities program such as virus programs or disk doctors None of the above
22
Start Finish #1 #2 #3 #4 #5 #6 #7 #8
23
Which of the following is a true statement? I can allow a student to take the classroom attendance for me when I am busy with a student or have a sub in my class.I can allow a student to take the classroom attendance for me when I am busy with a student or have a sub in my class. I should let a fellow team member or trusted students enter my grades in the gradebook program when I am unable to do so myself.I should let a fellow team member or trusted students enter my grades in the gradebook program when I am unable to do so myself. I should never allow a student to work in the attendance, gradebook, or other password restricted programs on my computer.I should never allow a student to work in the attendance, gradebook, or other password restricted programs on my computer. I should leave my password written on a note near my computer in case I forget it and am unable to take attendance or enter grades.I should leave my password written on a note near my computer in case I forget it and am unable to take attendance or enter grades.
25
Start Finish #1 #2 #3 #4 #5 #6 #7 #8 #9
26
Which of the following is a true statement? When using the Internet I am protected from accessing all inappropriate material.When using the Internet I am protected from accessing all inappropriate material. When using the Internet my log of Internet sites visited can be reviewed and traced to verify appropriate use.When using the Internet my log of Internet sites visited can be reviewed and traced to verify appropriate use. When using the Internet I have permission to try to visit questionable sites before and after school, as long as students are not in my room.When using the Internet I have permission to try to visit questionable sites before and after school, as long as students are not in my room. When using the Internet the program N2H2 ensures that my use of the Internet is completely safe and secure.When using the Internet the program N2H2 ensures that my use of the Internet is completely safe and secure. When using the Internet I am protected from accessing all inappropriate material.When using the Internet I am protected from accessing all inappropriate material. When using the Internet my log of Internet sites visited can be reviewed and traced to verify appropriate use.When using the Internet my log of Internet sites visited can be reviewed and traced to verify appropriate use. When using the Internet I have permission to try to visit questionable sites before and after school, as long as students are not in my room.When using the Internet I have permission to try to visit questionable sites before and after school, as long as students are not in my room. When using the Internet the program N2H2 ensures that my use of the Internet is completely safe and secure.When using the Internet the program N2H2 ensures that my use of the Internet is completely safe and secure.
28
Start Finish #1 #2 #3 #4 #5 #6 #7 #8 #9 #10
29
Since the district has allowed me limited personal use of the Internet and e-mail which of the following activities are acceptable? Chain letters and/or e-mails to everyone with cute jokes or advertisementChain letters and/or e-mails to everyone with cute jokes or advertisement Commercial activities Political lobbying None of the above Chain letters and/or e-mails to everyone with cute jokes or advertisementChain letters and/or e-mails to everyone with cute jokes or advertisement Commercial activities Political lobbying None of the above
31
Start Finish #1 #2 #3 #4 #5 #6 #7 #8 #9 #10 #11
32
When I get an e-mail that contains obscene or pornographic material I should : Print a copy and place it in a file for future reference.Print a copy and place it in a file for future reference. Share it with my fellow colleagues by forwarding it to them.Share it with my fellow colleagues by forwarding it to them. Delete the e-mail from my inbox and trash folder and politely notify the sender that it was inappropriate for me to receive such material at work.Delete the e-mail from my inbox and trash folder and politely notify the sender that it was inappropriate for me to receive such material at work. Leave it on my machine but file it in a special folder so that it cannot be immediately seen.Leave it on my machine but file it in a special folder so that it cannot be immediately seen. Print a copy and place it in a file for future reference.Print a copy and place it in a file for future reference. Share it with my fellow colleagues by forwarding it to them.Share it with my fellow colleagues by forwarding it to them. Delete the e-mail from my inbox and trash folder and politely notify the sender that it was inappropriate for me to receive such material at work.Delete the e-mail from my inbox and trash folder and politely notify the sender that it was inappropriate for me to receive such material at work. Leave it on my machine but file it in a special folder so that it cannot be immediately seen.Leave it on my machine but file it in a special folder so that it cannot be immediately seen.
34
Start Finish #1 #2 #3 #4 #5 #6 #7 #8 #9 #10#11 #12
35
While creating written projects, multimedia projects, or web pages which of the following copyright laws are appropriate? I may copy professional logos to use on a school website.I may copy professional logos to use on a school website. I may not use any copyrighted materials without written/electronic permission from the company or webmaster.I may not use any copyrighted materials without written/electronic permission from the company or webmaster. I may use all pictures from a web page as long as it is not a company logo.I may use all pictures from a web page as long as it is not a company logo. Even though I must get permission to use the pictures and graphics I have permission to use music files.Even though I must get permission to use the pictures and graphics I have permission to use music files. I may copy professional logos to use on a school website.I may copy professional logos to use on a school website. I may not use any copyrighted materials without written/electronic permission from the company or webmaster.I may not use any copyrighted materials without written/electronic permission from the company or webmaster. I may use all pictures from a web page as long as it is not a company logo.I may use all pictures from a web page as long as it is not a company logo. Even though I must get permission to use the pictures and graphics I have permission to use music files.Even though I must get permission to use the pictures and graphics I have permission to use music files.
37
Start Finish #1 #2 #3 #4 #5 #6 #7 #8 #9 #10#11#12 #13
38
Which of the following is unacceptable when using district equipment or materials? Malicious attempt to harm, modify or destroy district equipment or materialsMalicious attempt to harm, modify or destroy district equipment or materials Moving of hardware(computer, monitor, printer,etc.) from set place without permission of building TIS or technicianMoving of hardware(computer, monitor, printer,etc.) from set place without permission of building TIS or technician Placing stickers on units or stacking papers and materials around equipment that can prevent proper ventilationPlacing stickers on units or stacking papers and materials around equipment that can prevent proper ventilation All of the above Malicious attempt to harm, modify or destroy district equipment or materialsMalicious attempt to harm, modify or destroy district equipment or materials Moving of hardware(computer, monitor, printer,etc.) from set place without permission of building TIS or technicianMoving of hardware(computer, monitor, printer,etc.) from set place without permission of building TIS or technician Placing stickers on units or stacking papers and materials around equipment that can prevent proper ventilationPlacing stickers on units or stacking papers and materials around equipment that can prevent proper ventilation All of the above
40
Start Finish #1 #2 #3 #4 #5 #6 #7 #8 #9 #10#11#12#13 #14
41
If an employee is arrested by law enforcement or the FBI for inappropriate use of e-mail, Internet, or copyright violations VISD will: Provide legal defense in support for employee during time of litigation.Provide legal defense in support for employee during time of litigation. Pay for any expenses while defending ones self on charges.Pay for any expenses while defending ones self on charges. In no way be liable for any inappropriate use of district computers or VISD network usage.In no way be liable for any inappropriate use of district computers or VISD network usage. Send a representative from the district to meet with law enforcement to ensure that your rights are not violated.Send a representative from the district to meet with law enforcement to ensure that your rights are not violated.
43
Start Finish #1 #2 #3 #4 #5 #6 #7 #8 #9 #10#11#12#13 #14 #15
44
Employee names and e-mail addresses are: Available only to VISD employees Not available to anyone Available to VISD employees and the publicAvailable to VISD employees and the public None of the above Available only to VISD employees Not available to anyone Available to VISD employees and the publicAvailable to VISD employees and the public None of the above
46
Start Finish #1 #2 #3 #4 #5 #6 #7 #8 #9 #10#11#12#13 #14 #15 #16
47
Student photographs may be published on a district web page: With permission of the Director of TechnologyWith permission of the Director of Technology With permission of the Building PrincipalWith permission of the Building Principal With permission of the Superintendent With permission of the students parentsWith permission of the students parents With permission of the Director of TechnologyWith permission of the Director of Technology With permission of the Building PrincipalWith permission of the Building Principal With permission of the Superintendent With permission of the students parentsWith permission of the students parents
49
Start Finish #1 #2 #3 #4 #5 #6 #7 #8 #9 #10#11#12#13 #14 #15 #16 #17
50
VISDs goal in providing access to the network and the Internet is: To promote educational excellence. To compete with other school districts.To compete with other school districts. To allow teachers access who do not have it at home.To allow teachers access who do not have it at home. To attract new teachers to the district.To attract new teachers to the district. To promote educational excellence. To compete with other school districts.To compete with other school districts. To allow teachers access who do not have it at home.To allow teachers access who do not have it at home. To attract new teachers to the district.To attract new teachers to the district.
52
Start Good Job #1 #2 #3 #4 #5 #6 #7 #8 #9 #10#11#12#13 #14 #15 #16#17 Start Over VISD Tech
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.